Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Internet Security: Cyber Defense

No description
by

Alexandra Roth

on 13 December 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Security: Cyber Defense

Table by Center for Strategic and International Studies; McAfee
Internet Security: Cyber Defense
Cyber
- short for cyberspace, refers to both networked infrastructure and information assets

Defense
- the action of defending from or resisting an attack

Cyber
Defense
: active process of protecting critical information and function from attack
History and Development
Technological Aspects
Other aspects:
Social, political, economical
Future Developments
Political
Economic
https://www.fas.org/sgp/crs/misc/RL32331.pdf
Hacker
Malware
Encryption
"someone who can gain unauthorized access to other computers"
http://www.techterms.com/definition/hacker
Various definitions based on "broad generalizations"
Social
Additional References
Questions?
Digital Pearl Harbor
NSA Involvement
Government
"When warranted, the United States will respond to hostile acts in cyberspace as we would to
any other threat to our country
. All states possess an
inherent right to self-defense
, and we recognize that certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners. We reserve the right to use
all necessary means
—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests."
-
White House in it's official cybersecurity strategy
Department of Homeland Security
Comprehensive National Cybersecurity Initiative (CNCI) launched by President George W. Bush
National Cybersecurity and Communications Integration Center (NCCIC)
U.S. Computer Emergency Readiness Team (US-CERT)
National Security Agency
Operates under jurisdiction of DoD
Information Assurance Directorate (IAD) created under NSA mobility program to help users use the internet safely
National Information Assurance Education and Training Program (NIETP)
Cyber Defense Exercise (CDX)
"It's the great irony of the Information Age – the very technologies that empower us to create and to build also empower those who would disrupt and destroy." - President Barack Obama
U.S. Department of Defense
• Invests over $3 billion into cyber defense annually
• Established U.S. Cyber Command
In order to help our nation's cybersecurity we must secure our own networks.

Choney, Suzanne. "New York Times Hacked, Syrian Electronic Army Suspected." NBC News.National Broadcasting Company, 28 Aug. 2013. Web. 12 Nov. 2013.

Saydjari, Sami. "Cyber Defense: Art to Science." ACM.org. Association for Computing Machinery, Mar. 2004. Web. 03 Dec. 2013.

"Secretary Panetta's Speech About Cybersecurity." Oct 2012. Council on Foreign Relations. Dec 2013
Five strategic initiatives:
1. "Treat cyberspace as an operational domain to organize, train, and equip so that Department of Defense can take full advantage of cyberspace’s potential"
2. "Employ new defense operating concepts to protect DoD networks and systems"
3. "Partner with other U.S. government departments and agencies and the private sector to enable a whole-of-government cybersecurity strategy"
4. "Build robust relationships with U.S. allies and international partners to strengthen collective cybersecurity"
5. "Leverage the nation’s ingenuity through an exceptional cyber workforce and rapid technological innovation"
Spending too much money on offense
E-Z Pass packet defense:
where its coming from
where its going
good/bad
1949
AFSA (Armed Forces Security Agency was established
1952
AFSA redesignated as NSA (National Security Agency)
1988
The Morris Worm -
First computer worm
1988
Moonlight Maze - Computer probing discovered in networks at The Pentagon, NASA, and Department of Energy
2009
USCYBERCOM (United States Cyber Command) was established
2013
Syrian cyber attack on New York Times website
2011
Epsilon/Citigroup security breach
Info. from Department of Homeland Security website
Info. from NSA website
How do we put a monetary value on loss of intellectual property, reputational damage, or loss of sensitive business information?
"Nine trillion dollars a day moves through the
internet. And SCADA systems (Supervisory Control and Data Acquisition systems) - almost all of which are connected to the Internet for ease of use - power the financial system" - Tony Shaffer, cyber defense expert at the Center for Advanced Defense Studies
A breach of a central system can compromise an entire financial system
Firms suffer losses of 1%-5% in the days after a cyber attack.
For something like the NY Stock Exchange, this translates to shareholder losses of between $50 million and $200 million.
http://www.cbn.com/cbnnews/us/2011/december/americas-cyber-defenses-a-digital-pearl-harbor-/
Department of Homeland Security
Defense Industrial Base
DoD revised its rules of engagement in cyberspace to spell out the duty of the military
Collective Cyber Defense
Japan
Ban together to punish offending countries like China
Training and education
Exercises/practice
Stronger encryption
Better policies
More effective detection systems to recognize and stop cyberattacks quickly
What we need to look out for:
Attacks on critical infrastructures (industrial control systems that are managed by computer systems)
water supplies
electrical grid
transportation systems (ex: railroad track switches, draw bridges, etc)
financial systems
Cyberterrorism + Physical Terrorism
Ex: bombing a city AND shutting down electricity at hospitols
"Confidentiality of Information"
http://abcnews.go.com/Technology/video/hackers-pilfer-2m-facebook-google-passwords-21111610
Full transcript